Answers Rated A+
Threats are... - answer...unwanted actions potentially harming assets.
Vulnerabilities are... - answer...weaknesses in any safeguard for cyber assets.
The likelihood of a threat is... - answer...the possibility that it may arise.
The consequence of a threat is... - answer...the worst-case outcome of a threat.
According to NIST 800-50, education is... - answer...any course/material that provides
employees the necessary decision-making and management skills to improve
promotional ability and mobility.
According to NIST 800-50, training is... - answer...any course/material to provide
employees the necessary skills to perform their job functions.
According to NIST 800-50, awareness is... - answer...any orientation brief/material that
informs and reminds employees of their security responsibilities and management's
expectations.
The benefits of Privacy Impact Assessments are... - answer...project compliance with
laws, reflection of community values in designs, reduction of future costs, achievement
of project goals, promotion of awareness, and ERM.
The risks of Privacy Impact Assessments are... - answer...non-compliance with laws,
loss of credibility with impacted entities, reputational damage, additional costs, and
inadequate solutions.
Types of IP and their definitions. - answerTrademark - symbol, word, logo.
Registered trademark - registration with a national authority.
Nice Classification (NCL) - Goods are 1-34, Services 35-45. An international
classification of goods and services.
Patent - exlusive rights to make/sell invention, but must be public.
Copyright - lawful right to control the dissemination of content.
, Trade Secrets - proprietary information that is confidential and protected assuming
owner takes security precautions.
NIST Cybersecurity Framework (CSF) - answerIDENTIFY - PROTECT - DETECT -
RESPOND - RECOVER
Typical roles and responsibilities across an organisation - answerBoard of Directors →
Executive Committee → ISM/CSM → Cyber Security Practitioners → External
Specialists
Cyber Security Triad - answerConfidentiality - only disclose information to those with
appropriate clearance, approval, and NTK
Integrity - info only created, modified, destroyed, or managed through authorised means
Availability - information may be readily accessed
The definitions for Governance, Risk Management & Compliance - answerGovernance:
Management and oversight at the organisational level
Risk management: Process of identifying and managing risk to acceptable levels
Compliance: demonstrating adherence to set of requirements
the difference between risk tolerance and risk appetite - answerRisk tolerance: what an
organisation willing to bear on a case-by-case basis after all treatment options have
been considered and applied
Risk appetite: level of risk that an organisation willing to pursue or retain to meet its
strategic objectives
the logical order of the Risk Management and Process (ISO 31000) - answerContext
establishment → risk identification → risk analysis → risk evaluated → risk treatment →
monitoring and review
identify and list the attributes of cyber attacks - answerOrigin (internal/external), history
(similar threats), capability (skill of attacker), profile (general behaviour), intent
(adversarial/accidental/environmental), motivation (to targe org.), focus (how
determined, what resources)
Types of malicious software, especially APTs, and ransomware - answerAPTs -
conducted by skilled and motivated adversary using variety of different methods, e.g.,
social engineering, theft of sensitive data or IP, technical attacks through software,
persistence
Virus - infection of host file or program